CVE-2025-21062
BaseFortify
Publication date: 2025-10-10
Last updated on: 2025-10-28
Assigner: Samsung Mobile
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| samsung | smart_switch | to 3.7.67.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the use of a broken or risky cryptographic algorithm in Smart Switch versions prior to 3.7.67.2. It allows local attackers to replace the restoring application, but requires user interaction to trigger the exploit.
How can this vulnerability impact me? :
The vulnerability can lead to a local attacker replacing the restoring application, which may result in complete compromise of confidentiality, integrity, and availability of the affected system or data.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update Smart Switch to version 3.7.67.2 or later to avoid the use of the broken or risky cryptographic algorithm that allows local attackers to replace the restoring application.